CN110188530A - A kind of safety certifying method, device, equipment and readable storage medium storing program for executing - Google Patents

A kind of safety certifying method, device, equipment and readable storage medium storing program for executing Download PDF

Info

Publication number
CN110188530A
CN110188530A CN201910463833.4A CN201910463833A CN110188530A CN 110188530 A CN110188530 A CN 110188530A CN 201910463833 A CN201910463833 A CN 201910463833A CN 110188530 A CN110188530 A CN 110188530A
Authority
CN
China
Prior art keywords
computer system
target computer
safety
authentication information
pcr16
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910463833.4A
Other languages
Chinese (zh)
Inventor
刘海伟
吴保锡
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Suzhou Wave Intelligent Technology Co Ltd
Original Assignee
Suzhou Wave Intelligent Technology Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Suzhou Wave Intelligent Technology Co Ltd filed Critical Suzhou Wave Intelligent Technology Co Ltd
Priority to CN201910463833.4A priority Critical patent/CN110188530A/en
Publication of CN110188530A publication Critical patent/CN110188530A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/44Program or device authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/572Secure firmware programming, e.g. of basic input output system [BIOS]

Abstract

The invention discloses a kind of safety certifying methods, method includes the following steps: sending safe condition request to the target computer system of operating status;Receive the authentication information of target computer system feedback;Wherein, authentication information is to obtain after target computer system carries out dynamic measurement;Using the safety of authentication information verifying target computer system, security certification result is obtained.As it can be seen that this method can carry out effective safety verification to object-computer, it is reliable and secure for further can ensure that target computer system under operation when target computer system is run.The invention also discloses a kind of safety certification device, equipment and readable storage medium storing program for executing, have corresponding technical effect.

Description

A kind of safety certifying method, device, equipment and readable storage medium storing program for executing
Technical field
The present invention relates to computer application technology, more particularly to a kind of safety certifying method, device, equipment and can Read storage medium.
Background technique
Current social information technology is maked rapid progress, and internet has been socially reintegrated the every aspect of life.Internet is to people While offer convenience, stern challenge is also brought for computer system security.In addition to external attacks such as internet worms, dislike Meaning administrator etc. internal attack system can also be caused safely it is potentially hazardous.
How fundamentally timely discovery system safety is distorted important as information security by external attack and malice Goal in research.Trusted Computing Group (Trusted Computing Group) proposes to utilize reliable computing technology, with TPM chip For root of trust, it is based on transitive trust technology, in the booting operating system stage, constructs trust computing system to protect the peace of system Entirely.This method can ensure BIOS, MBR, BootLoader using staticametric technology, and OS Kernel is in os starting Hardware, firmware and O/S kernel are reliable and secure in the process.But after os starting, transitive trust process terminates.By In trust chain system start after, the transmittance process of trust chain just finishes, thus computer system operation when, just without Method effectively verifies the safety of computer system based on trust chain.And computer system is at runtime, malicious attack meeting It causes damages safely to system.
In conclusion the problems such as how efficiently solving safety certification when computer system operation, is current this field Technical staff's technical problem urgently to be solved.
Summary of the invention
The object of the present invention is to provide a kind of safety certifying method, device, equipment and readable storage medium storing program for executing, in operation The computer system of state carries out safety certification, to ensure that computer system is reliable and secure.
In order to solve the above technical problems, the invention provides the following technical scheme:
A kind of safety certifying method, comprising:
Safe condition request is sent to the target computer system of operating status;
Receive the authentication information of the target computer system feedback;Wherein, the authentication information is target calculating It is obtained after machine system progress dynamic measurement;
The safety of the target computer system is verified using the authentication information, obtains security certification result.
Preferably, the safety that the target computer system is verified using the authentication information, comprising:
It is whether complete reliable using authentication information described in signature verification;
If it is, judging whether the authentication information matches with a reference value;
If matching, it is determined that the target computer system is in complete state;
If mismatching, it is determined that the target computer system is in non-secure states.
Preferably, after determining that the target computer system is in non-secure states, further includes:
Unsafe listed files information in the target computer system is determined using the authentication information.
Preferably, the target computer system carries out dynamic measurement, comprising:
The target computer system carries out the file in dynamic measurement listed files using dynamic measurement technology complete Property measurement;
PCR16 metric extension is carried out to the file using TPM chip.
Preferably, it is described using TPM chip to the file carry out PCR16 metric extension after, carrying out feeding back it Before, further includes:
It is signed using result of the TPM chip to the PCR16 metric extension.
It is preferably, described to be signed using result of the TPM chip to the PCR16 metric extension, comprising:
It is signed using result of the ECC private key in the TPM chip to the PCR16 metric extension.
Preferably, before the transmission safe condition request to the target computer system of operating status, further includes:
The safety certification registration request of the target computer system is received, and the safety certification registration request is carried out Parsing obtains the EK public key and encrypted public key of TPM chip in the target computer system;
The EK public key and the encrypted public key are stored, and sends dynamic measurement file column to the target computer system The a reference value of table collects request;
Receive and store a reference value of the target computer system feedback.
A kind of safety certification device, comprising:
Safe condition request sending module, for sending safe condition request to the target computer system of operating status;
Authentication information receiving module, for receiving the authentication information of the target computer system feedback;Wherein, described to recognize The card information target computer system obtains after carrying out dynamic measurement;
Security authentication module is obtained for being verified the safety of the target computer system using the authentication information Security certification result.
A kind of safety certificate equipment, comprising:
Memory, for storing computer program;
Processor, the step of above-mentioned safety certifying method is realized when for executing the computer program.
A kind of readable storage medium storing program for executing is stored with computer program, the computer program quilt on the readable storage medium storing program for executing The step of processor realizes above-mentioned safety certifying method when executing.
Using method provided by the embodiment of the present invention, safe condition is sent to the target computer system of operating status and is asked It asks;Receive the authentication information of target computer system feedback;Wherein, authentication information is that target computer system carries out dynamic measurement It obtains afterwards;Using the safety of authentication information verifying target computer system, security certification result is obtained.In view of needing When determining whether target computer system is safe, if target computer system itself is dangerous, target computer system is mentioned The safe condition of confession should also be as being insecure, thus safe condition should not voluntarily be determined by target computer system.It is based on This sends safe condition request to target computer system when target computer system is in operating status.Object-computer After the safe condition request that system receives, dynamic measurement is carried out, and will carry out including the authentication information of dynamic measurement result anti- Feedback.After receiving authentication information, the safety of authentication information verifying target computer system can be utilized.As it can be seen that the party Method can carry out effective safety verification to object-computer, further can ensure that target meter when target computer system is run Calculation machine system is reliable and secure under operation.
Correspondingly, the embodiment of the invention also provides safety certification device corresponding with above-mentioned safety certifying method, set Standby and readable storage medium storing program for executing, has above-mentioned technique effect, and details are not described herein.
Detailed description of the invention
In order to more clearly explain the embodiment of the invention or the technical proposal in the existing technology, to embodiment or will show below There is attached drawing needed in technical description to be briefly described, it should be apparent that, the accompanying drawings in the following description is only this Some embodiments of invention for those of ordinary skill in the art without creative efforts, can be with It obtains other drawings based on these drawings.
Fig. 1 is a kind of implementation flow chart of safety certifying method in the embodiment of the present invention;
Fig. 2 is a kind of specific implementation flow chart of safety certifying method in the embodiment of the present invention;
Fig. 3 is a kind of another specific flow chart of safety certifying method in the embodiment of the present invention;
Fig. 4 is a kind of structural schematic diagram of safety certification device in the embodiment of the present invention;
Fig. 5 is a kind of structural schematic diagram of safety certificate equipment in the embodiment of the present invention;
Fig. 6 is a kind of concrete structure schematic diagram of safety certificate equipment in the embodiment of the present invention.
Specific embodiment
In order to enable those skilled in the art to better understand the solution of the present invention, with reference to the accompanying drawings and detailed description The present invention is described in further detail.Obviously, described embodiments are only a part of the embodiments of the present invention, rather than Whole embodiments.Based on the embodiments of the present invention, those of ordinary skill in the art are not making creative work premise Under every other embodiment obtained, shall fall within the protection scope of the present invention.
Embodiment one:
Referring to FIG. 1, Fig. 1 is a kind of flow chart of safety certifying method in the embodiment of the present invention, this method be can be applied to In the equipment or platform of the non-targeted computer system at such as remote authentication center.It is below for ease of description, long-range to be applied to It is illustrated for authentication center;Specific implementation applied to other equipment or platform can refer to and this.This method includes following Step:
S101, safe condition request is sent to the target computer system of operating status.
When completing to start in target computer system, and entering operating status, remote authentication center can be to operating status Target computer system send safe condition request.Wherein, in order to ensure the reliability of security certification result, will can remotely recognize Card center is deployed in the high environment of physical isolation, security level;Target computer system can for remote authentication center into Row registration, and remote authentication center has by verifying target computer system whether based on any one of An Quan verification information Calculation machine system.In embodiments of the present invention, without limitation for the scale of target computer system and specific business.
Referring to FIG. 2, Fig. 2 is a kind of specific implementation flow chart of safety certifying method in the embodiment of the present invention, target meter Calculation machine system is to be certified center in Fig. 2.It is requested sending safe condition to the target computer system of operating status Before, registration process of the target computer system at remote authentication center, comprising:
Step 1: receiving the safety certification registration request of target computer system, and safety certification registration request is carried out Parsing obtains the EK public key and encrypted public key of TPM chip in target computer system;
Step 2: storage EK public key and encrypted public key, and dynamic measurement listed files is sent to target computer system A reference value collects request;
Step 3: receiving and storing a reference value of target computer system feedback.
It is illustrated for ease of description, below combining above three step.
When target computer system is registered at remote authentication center, safety certification can be sent to remote authentication center Request, which includes the EK public key and encrypted public key of TPM chip.Wherein, the endorsement key EK of TPM chip (Endorsement Key) is built in each TPM chip by the manufacturer of TPM chip, represents the true of each TPM chip Identity, each TPM chip are owned by a unique EK.Specifically, the EK of TPM chip is the RSA key of 2048 bits Right, wherein EK private key is built in TPM chip, and external entity can not obtain;EK public key can by TPM instruct obtain, externally into Row is open.The EK of TPM chip be mostly as endorsement code key, generate individual encryption and decryption sub-key pair, with the sub-key into Row signature.TPM chip can be generated other ECC type and (be also possible to RSA type, due to ECC class using EK as main code key Type compares, and RSA attack tolerant is strong, encryption/decryption speed is fast, is proposed with ECC type herein) signature code key, ECC private key save Inside TPM chip, ECC public key can be sent to remote authentication center.Remote authentication center can use ECC public key decryptions by The information of the ECC private key signature of TPM chip, thus to guarantee that target computer system is sent to the complete of remote authentication central information Whole property and non repudiation.
It, can be to safety certification after remote authentication center receives the safety certification registration request of target computer system transmission Registration request carries out the EK public key and encrypted public key that parsing obtains TPM chip in target computer system.Then, EK public key is stored And encrypted public key, such as can be by EK public key and encrypted public key storage into the information database Node_info at remote authentication center.
Request is collected to a reference value that target computer system sends dynamic measurement listed files in remote authentication center.Its In, dynamic measurement listed files (Dynamic Measurement File List, DMFL) is when carrying out safety certification, to need The listed files of integrality is verified, which, which can refer to, trusts the safety of computer system currently based on trust chain When, the listed files of required verifying integrality;It can also be determined and adjust according to practical application request.Target computer system It, can be using dynamic measurement technology to each text corresponding to dynamic measurement listed files after receiving a reference value collection request Part carries out dynamic measurement, and feeds back to remote authentication center for dynamic measurement result as a reference value.Preferably, to each text After part carries out dynamic measurement, PCR16 metric extension can be also carried out to dynamic measurement result (cryptographic Hash of such as each file), and will Dynamic measurement result and PCR16 metric extension value feed back to remote validation center as a reference value.Specifically, target computer System can the form of " filename-file cryptographic Hash and iteration cryptographic Hash-PCR16 metric extension value " return in remote authentication The heart.
Remote authentication center receives and stores a reference value of target computer system feedback.Specifically, remote authentication center It is " filename-Documents Metric a reference value that " filename-file cryptographic Hash and iteration cryptographic Hash-PCR16 metric extension value ", which can be stored, With iteration cryptographic Hash-PCR16 measuring standard value " it is stored in a reference value database Node_ref.
In this way, target computer system can be completed to register at remote authentication center.
After target computer system receives safe condition request, dynamic measurement can be carried out, and measurement results are made Remote authentication center is fed back to for authentication information.Wherein, target computer system carries out dynamic measurement, comprising: object-computer System carries out integrity measurement to the file in dynamic measurement listed files using dynamic measurement technology;Using TPM chip to text Part carries out PCR16 metric extension.Specifically, target computing system is using dynamic measurement technology to dynamic measurement listed files middle finger Fixed file carries out the PCR16 metric extension of integrity measurement and TPM chip.Due to being calculated when this document is tampered Cryptographic Hash it is inevitable inconsistent with the cryptographic Hash before being tampered, therefore the cryptographic Hash of file represents integrity information.Therefore, exist In the embodiment of the present invention, it is specially that Hash calculation is carried out to file to integrity measurement, obtains the cryptographic Hash of this document.Dynamic Degree Amount technology is the PCR16's of Hash calculation and TPM chip in the operating system stage respectively to the file in DMFL in real time Metric extension.PCR16 can be extended in the operating system stage, therefore select PCR16.Metric extension value expands to The process of PCR16 is as follows:
PCR16 [K]=Hash (PCR16 [K-1] | Hash (File_K));
Wherein, it PCR16 [K]: represents when k-th of file needs to extend in measurement list, needs to be saved in PCR16's Value;PCR16 [K-1]: it represents before k-th of file needs to extend in measurement list, the value in original PCR16;|: it represents two A value is spliced into a value (by two string-concatenations at a character string);Hash (File_K): the degree of k-th of file is represented Magnitude;Hash: representing and use Hash operation, and the present invention refers in particular to SHA256;Final PCR16 stores the iteration of file in DMFL Cryptographic Hash represents All Files integrity information in DMFL.The cryptographic Hash of each file represents each file sheet in DMFL The integrity information of body.
It should be noted that target computer system institute after the safe condition request for receiving the transmission of remote authentication center The realization step of the dynamic measurement of progress is identical as the dynamic measurement step carried out when being registered, can be cross-referenced.
S102, the authentication information for receiving target computer system feedback.
Wherein, authentication information is to obtain after target computer system carries out dynamic measurement.
S103, the safety of authentication information verifying target computer system, acquisition security certification result are utilized.
Preferably, in order to ensure complete and reliable, the object-computer of authentication information that remote authentication center receives System is after carrying out PCR16 metric extension to file using TPM chip, before being fed back, also utilizes TPM chip pair The result of PCR16 metric extension is signed.Due to the ECC type in TPM chip signature key compared to RSA type signature Key attack tolerant is stronger, encryption and decryption depth is fast, thus be proposed with ECC signature key to the result of PCR16 metric extension into Row signature.Signed using the ECC private key in TPM chip to the result of PCR16 metric extension.
Correspondingly, whether remote authentication center, can complete using signature verification authentication information when carrying out security credential It is whole reliable;If it is, judging whether authentication information matches with a reference value;If matching, it is determined that target computer system is in Complete state;If mismatching, it is determined that target computer system is in non-secure states.Specifically, remote authentication center into When row security credential, if signature verification does not pass through, show that authentication information has been tampered or has lacked, thus target calculates at this time The safety certification of machine system fails.When the complete reliability of authentication information passes through, can by the value of the PCR16 in authentication information with Benchmark is compared, if the value of PCR16 is identical as a reference value, shows file all in DMFL and is not tampered with, this When target computer system be safe.If the value of PCR16 and a reference value be not identical, it is determined that target computer system is not Safety.
Preferably, when determining that target computer system is dangerous, object-computer is determined using authentication information Unsafe listed files information in system.Specifically, being the benchmark of the cryptographic Hash of more each file and each file one by one Value, is which file is tampered to find bottom.In this way, the file being tampered can be apparent from, guarantee target is calculated The safety of machine system has directive significance.
Using method provided by the embodiment of the present invention, safe condition is sent to the target computer system of operating status and is asked It asks;Receive the authentication information of target computer system feedback;Wherein, authentication information is that target computer system carries out dynamic measurement It obtains afterwards;Using the safety of authentication information verifying target computer system, security certification result is obtained.In view of needing When determining whether target computer system is safe, if target computer system itself is dangerous, target computer system is mentioned The safe condition of confession should also be as being insecure, thus safe condition should not voluntarily be determined by target computer system.It is based on This sends safe condition request to target computer system when target computer system is in operating status.Object-computer After the safe condition request that system receives, dynamic measurement is carried out, and will carry out including the authentication information of dynamic measurement result anti- Feedback.After receiving authentication information, the safety of authentication information verifying target computer system can be utilized.As it can be seen that the party Method can carry out effective safety verification to object-computer, further can ensure that target meter when target computer system is run Calculation machine system is reliable and secure under operation.
Better understand the provided safety certifying method of the embodiment of the present invention for the ease of those skilled in the art, below with In conjunction with specific safety certification process, which is described in detail.
Referring to FIG. 3, Fig. 3 is a kind of another specific flow chart of safety certifying method in the embodiment of the present invention.Remotely Authentication center carries out the detailed process of safety certification to node (with target computer system above) is certified, comprising:
(such as reach the safety certification period when needing and obtaining and be certified the safe condition of node or receive safety certification and ask When asking), remote authentication center hair requests to be certified node to this from safe condition;
Be certified node receive safe condition request when, read local disk storage DMFL dynamic measurement listed files, And Hash calculation is carried out to file one by one, and expand in the PCR16 of TPM chip;
Be certified after all DMFL dynamic measurement listed files have been calculated in node, obtain filename-cryptographic Hash and Then PCR16 metric extension value signs to PCR 16 using the ECC private key of TPM chip, obtains Signature (PCR16), it finally returns to and gives remote authentication center;
After remote authentication center receives safe condition return information, using what is stored in Node_info database Pub_Ecc public key (obtains PCR16 with Pub_Ecc decrypted signature value, and transmits together to Signature (PCR16) sign test The original PCR16 metric to come over is identical, then shows that sign test passes through).If sign test passes through, show that data transmission procedure transmits Identity is to be certified node, into next step;Otherwise, exportable warning message is certified node identity information verification failure, It is then log out identifying procedure;
The verification of remote authentication center is certified after node identity information passes through, and PCR16 metric extension value is parsed, with benchmark PCR16 a reference value in the Node_ref of Value Data library compares, if identical show that the system for being certified node is safe.It is no Then being certified on node has file integrality to be destroyed, and can enter next step lookup and determine that the integrality of which file is broken It is bad;
Remote authentication center parses filename-cryptographic Hash in the DMFL for being certified node return, while from a reference value number " filename-Documents Metric a reference value " is obtained according in the Node_ref of library, the cryptographic Hash and a reference value of comparison document, find out not one by one It is identical, can judge as which file it is imperfect caused by be certified node system be unsafe.
It is based on by remote authentication center using dynamic measurement technology (measuring the integrality of file under operation) The mode of ECC signature verifies the safe condition for being certified node.By being certified Node registry mechanism (seeing above description), The relevant public key of identity is transferred to remote authentication center, and the identity private key for being certified node is stored into TPM chip, has very high Safety.
Embodiment two:
Corresponding to above method embodiment, the embodiment of the invention also provides a kind of safety certification devices, are described below Safety certification device can correspond to each other reference with above-described safety certifying method.
Shown in Figure 4, which comprises the following modules:
Safe condition request sending module 101 is asked for sending safe condition to the target computer system of operating status It asks;
Authentication information receiving module 102, for receiving the authentication information of target computer system feedback;Wherein, certification letter Breath is to obtain after target computer system carries out dynamic measurement;
Security authentication module 103 obtains safety and recognizes for the safety using authentication information verifying target computer system Demonstrate,prove result.
Using device provided by the embodiment of the present invention, safe condition is sent to the target computer system of operating status and is asked It asks;Receive the authentication information of target computer system feedback;Wherein, authentication information is that target computer system carries out dynamic measurement It obtains afterwards;Using the safety of authentication information verifying target computer system, security certification result is obtained.In view of needing When determining whether target computer system is safe, if target computer system itself is dangerous, target computer system is mentioned The safe condition of confession should also be as being insecure, thus safe condition should not voluntarily be determined by target computer system.It is based on This sends safe condition request to target computer system when target computer system is in operating status.Object-computer After the safe condition request that system receives, dynamic measurement is carried out, and will carry out including the authentication information of dynamic measurement result anti- Feedback.After receiving authentication information, the safety of authentication information verifying target computer system can be utilized.As it can be seen that the dress Effective safety verification can be carried out to object-computer, further can ensure that target meter when target computer system is run by setting Calculation machine system is reliable and secure under operation.
In a kind of specific embodiment of the invention, security authentication module 103, comprising:
Complete reliability demonstration unit, for whether complete reliable using signature verification authentication information;
Safety certification judging unit, if for authentication information be it is complete reliable, judge authentication information and a reference value Whether match;
Safe condition determination unit, if being matched for authentication information with a reference value, it is determined that target computer system is in Complete state;
Non-secure states determination unit, if being mismatched for authentication information and a reference value, it is determined that target computer system In non-secure states.
In a kind of specific embodiment of the invention, non-secure states determination unit, specifically for determining target meter Calculation machine system is in after non-secure states, determines unsafe listed files in target computer system using authentication information Information.
In a kind of specific embodiment of the invention, further includes: registration module, based in the target to operating status Before calculation machine system sends safe condition request, the safety certification registration request of target computer system is received, and recognize safety Card registration request carries out EK public key and encrypted public key that parsing obtains TPM chip in target computer system;Store EK public key and Encrypted public key, and request is collected to a reference value that target computer system sends dynamic measurement listed files;Receive and store mesh Mark a reference value of computer system feedback.
It should be noted that since the device is the device for carrying out safety certification to target computer system, thus When safety certification, computer system is needed to carry out dynamic measurement, and feeds back authentication information to the device.Specifically, target calculates Machine system carries out dynamic measurement, comprising: target computer system is using dynamic measurement technology in dynamic measurement listed files File carries out integrity measurement;PCR16 metric extension is carried out to file using TPM chip.Preferably, TPM chip pair is being utilized After file carries out PCR16 metric extension, before being fed back, further includes: using TPM chip to PCR16 metric extension As a result it signs.Preferably, target computer system is using the ECC private key in TPM chip to the result of PCR16 metric extension It signs.
Embodiment three:
Corresponding to above method embodiment, the embodiment of the invention also provides a kind of safety certificate equipments, are described below A kind of safety certificate equipment can correspond to each other reference with a kind of above-described safety certifying method.
Shown in Figure 5, which includes:
Memory D1, for storing computer program;
Processor D2, when for executing computer program the step of the safety certifying method of realization above method embodiment.
Specifically, referring to FIG. 6, Fig. 6 be a kind of concrete structure schematic diagram of safety certificate equipment provided in this embodiment, The safety certificate equipment can generate bigger difference because configuration or performance are different, may include one or more processing Device (central processing units, CPU) 322 (for example, one or more processors) and memory 332, one (such as one or more mass memories of storage medium 330 of a or more than one storage application program 342 or data 344 Equipment).Wherein, memory 332 and storage medium 330 can be of short duration storage or persistent storage.It is stored in storage medium 330 Program may include one or more modules (diagram does not mark), and each module may include in data processing equipment Series of instructions operation.Further, central processing unit 322 can be set to communicate with storage medium 330, in safety certification The series of instructions operation in storage medium 330 is executed in equipment 301.
Safety certificate equipment 301 can also include one or more power supplys 326, one or more wired or nothings Wired network interface 350, one or more input/output interfaces 358, and/or, one or more operating systems 341. For example, Windows ServerTM, Mac OS XTM, UnixTM, LinuxTM, FreeBSDTM etc..
Step in safety certifying method as described above can be realized by the structure of safety certificate equipment.
Example IV:
Corresponding to above method embodiment, the embodiment of the invention also provides a kind of readable storage medium storing program for executing, are described below A kind of readable storage medium storing program for executing can correspond to each other reference with a kind of above-described safety certifying method.
A kind of readable storage medium storing program for executing is stored with computer program on readable storage medium storing program for executing, and computer program is held by processor The step of safety certifying method of above method embodiment is realized when row.
The readable storage medium storing program for executing be specifically as follows USB flash disk, mobile hard disk, read-only memory (Read-Only Memory, ROM), the various program storage generations such as random access memory (Random Access Memory, RAM), magnetic or disk The readable storage medium storing program for executing of code.
Professional further appreciates that, unit described in conjunction with the examples disclosed in the embodiments of the present disclosure And algorithm steps, can be realized with electronic hardware, computer software, or a combination of the two, in order to clearly demonstrate hardware and The interchangeability of software generally describes each exemplary composition and step according to function in the above description.These Function is implemented in hardware or software actually, the specific application and design constraint depending on technical solution.Profession Technical staff can use different methods to achieve the described function each specific application, but this realization is not answered Think beyond the scope of this invention.

Claims (10)

1. a kind of safety certifying method characterized by comprising
Safe condition request is sent to the target computer system of operating status;
Receive the authentication information of the target computer system feedback;Wherein, the authentication information is the target computer It is obtained after system progress dynamic measurement;
The safety of the target computer system is verified using the authentication information, obtains security certification result.
2. safety certifying method according to claim 1, which is characterized in that described using described in authentication information verifying The safety of target computer system, comprising:
It is whether complete reliable using authentication information described in signature verification;
If it is, judging whether the authentication information matches with a reference value;
If matching, it is determined that the target computer system is in complete state;
If mismatching, it is determined that the target computer system is in non-secure states.
3. safety certifying method according to claim 2, which is characterized in that determining that the target computer system is in After non-secure states, further includes:
Unsafe listed files information in the target computer system is determined using the authentication information.
4. safety certifying method according to any one of claims 1 to 3, which is characterized in that the target computer system Carry out dynamic measurement, comprising:
The target computer system carries out integrality degree to the file in dynamic measurement listed files using dynamic measurement technology Amount;
PCR16 metric extension is carried out to the file using TPM chip.
5. safety certifying method according to claim 4, which is characterized in that utilize TPM chip to the file described After carrying out PCR16 metric extension, before being fed back, further includes:
It is signed using result of the TPM chip to the PCR16 metric extension.
6. safety certifying method according to claim 5, which is characterized in that described to utilize the TPM chip to described The result of PCR16 metric extension is signed, comprising:
It is signed using result of the ECC private key in the TPM chip to the PCR16 metric extension.
7. safety certifying method according to claim 1, which is characterized in that in the object-computer to operating status System is sent before safe condition request, further includes:
The safety certification registration request of the target computer system is received, and the safety certification registration request is parsed Obtain the EK public key and encrypted public key of TPM chip in the target computer system;
The EK public key and the encrypted public key are stored, and sends dynamic measurement listed files to the target computer system A reference value collects request;
Receive and store a reference value of the target computer system feedback.
8. a kind of safety certification device characterized by comprising
Safe condition request sending module, for sending safe condition request to the target computer system of operating status;
Authentication information receiving module, for receiving the authentication information of the target computer system feedback;Wherein, the certification letter It ceases after the target computer system carries out dynamic measurement and obtains;
Security authentication module obtains safety for verifying the safety of the target computer system using the authentication information Authentication result.
9. a kind of safety certificate equipment characterized by comprising
Memory, for storing computer program;
Processor, realizing the safety certifying method as described in any one of claim 1 to 7 when for executing the computer program Step.
10. a kind of readable storage medium storing program for executing, which is characterized in that be stored with computer program, the meter on the readable storage medium storing program for executing It is realized when calculation machine program is executed by processor as described in any one of claim 1 to 7 the step of safety certifying method.
CN201910463833.4A 2019-05-30 2019-05-30 A kind of safety certifying method, device, equipment and readable storage medium storing program for executing Pending CN110188530A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910463833.4A CN110188530A (en) 2019-05-30 2019-05-30 A kind of safety certifying method, device, equipment and readable storage medium storing program for executing

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910463833.4A CN110188530A (en) 2019-05-30 2019-05-30 A kind of safety certifying method, device, equipment and readable storage medium storing program for executing

Publications (1)

Publication Number Publication Date
CN110188530A true CN110188530A (en) 2019-08-30

Family

ID=67719007

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910463833.4A Pending CN110188530A (en) 2019-05-30 2019-05-30 A kind of safety certifying method, device, equipment and readable storage medium storing program for executing

Country Status (1)

Country Link
CN (1) CN110188530A (en)

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112182589A (en) * 2020-10-29 2021-01-05 中国南方电网有限责任公司 Industrial control host security defense system, method, computer equipment and storage medium

Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080046752A1 (en) * 2006-08-09 2008-02-21 Stefan Berger Method, system, and program product for remotely attesting to a state of a computer system
CN101226577A (en) * 2008-01-28 2008-07-23 南京大学 Method for protecting microkernel OS integrality based on reliable hardware and virtual machine
CN102436566A (en) * 2012-01-12 2012-05-02 冶金自动化研究设计院 Dynamic trusted measurement method and safe embedded system
CN103916246A (en) * 2014-03-31 2014-07-09 中国科学院软件研究所 Method and system for preventing cheating during examination based on trusted computing
CN105324779A (en) * 2013-04-15 2016-02-10 亚马逊技术有限公司 Host recovery using a secure store
US20160070929A1 (en) * 2013-06-07 2016-03-10 Amazon Technologies, Inc. Trusted computing host
CN105608386A (en) * 2016-03-11 2016-05-25 成都三零嘉微电子有限公司 Trusted computing terminal integrity measuring and proving method and device

Patent Citations (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20080046752A1 (en) * 2006-08-09 2008-02-21 Stefan Berger Method, system, and program product for remotely attesting to a state of a computer system
CN101226577A (en) * 2008-01-28 2008-07-23 南京大学 Method for protecting microkernel OS integrality based on reliable hardware and virtual machine
CN102436566A (en) * 2012-01-12 2012-05-02 冶金自动化研究设计院 Dynamic trusted measurement method and safe embedded system
CN105324779A (en) * 2013-04-15 2016-02-10 亚马逊技术有限公司 Host recovery using a secure store
US20160070929A1 (en) * 2013-06-07 2016-03-10 Amazon Technologies, Inc. Trusted computing host
CN103916246A (en) * 2014-03-31 2014-07-09 中国科学院软件研究所 Method and system for preventing cheating during examination based on trusted computing
CN105608386A (en) * 2016-03-11 2016-05-25 成都三零嘉微电子有限公司 Trusted computing terminal integrity measuring and proving method and device

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
杨蓓 等: ""基于可信计算的动态完整性度量模型"", 《计算机工程》 *
王勇 等: ""基于TPM2.0的内核完整性度量框架"", 《计算机工程》 *

Cited By (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112182589A (en) * 2020-10-29 2021-01-05 中国南方电网有限责任公司 Industrial control host security defense system, method, computer equipment and storage medium

Similar Documents

Publication Publication Date Title
CN109313690B (en) Self-contained encrypted boot policy verification
US10176330B2 (en) Global platform health management
US8127146B2 (en) Transparent trust validation of an unknown platform
US9405912B2 (en) Hardware rooted attestation
US10885197B2 (en) Merging multiple compute nodes with trusted platform modules utilizing authentication protocol with active trusted platform module provisioning
US8667263B2 (en) System and method for measuring staleness of attestation during booting between a first and second device by generating a first and second time and calculating a difference between the first and second time to measure the staleness
US10771264B2 (en) Securing firmware
US8880667B2 (en) Self regulation of the subject of attestation
CN110874494B (en) Method, device and system for processing password operation and method for constructing measurement trust chain
CN107133520B (en) Credibility measuring method and device for cloud computing platform
CN113014539B (en) Internet of things equipment safety protection system and method
CN105227319A (en) A kind of method of authentication server and device
US11604881B2 (en) Verification of a provisioned state of a platform
US10057254B2 (en) Mobile terminal for providing one time password and operating method thereof
CN113014444B (en) Internet of things equipment production test system and safety protection method
CN107480535A (en) The reliable hardware layer design method and device of a kind of two-way server
CN112511306A (en) Safe operation environment construction method based on mixed trust model
KR20180046593A (en) Internet of things device firmware update system for firmware signature verification and security key management
CN101908115B (en) Method for realizing software trusted execution based on trusted platform module
Dave et al. Care: Lightweight attack resilient secure boot architecture with onboard recovery for risc-v based soc
Dave et al. Sracare: Secure remote attestation with code authentication and resilience engine
CN110188530A (en) A kind of safety certifying method, device, equipment and readable storage medium storing program for executing
CN114547656A (en) Intel SGX-based two-stage remote certification method in cloud environment
CN111723379A (en) Trusted protection method, system, equipment and storage medium for trusted platform zone intelligent terminal
CN116305092B (en) Method and system for realizing trusted virtualization system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20190830

RJ01 Rejection of invention patent application after publication